It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 12452cam 2201261Ii 4500
001 ocn830377051
003 OCoLC
005 20201002120046.0
008 130319s2013 gw ob 101 0 eng d
006 m o d
007 cr cnu---unuuu
040 $aGW5XE$beng$erda$epn$cGW5XE$dCOO$dYDXCP$dZMC$dAUM$dOCLCO$dSNK$dOHS$dNLGGC$dUWW$dOCLCQ$dDAY$dOCLCO$dOCLCQ$dOCLCO$dEBLCP$dOCLCQ$dOCLCO$dTMC$dOCLCO$dYDX$dDGU$dESU$dIOG$dOCLCO$dMERER$dOCLCO$dOCLCA$dBUF$dOCLCO$dOCLCF$dOCLCO$dCEF$dU3W$dVT2$dREB$dKIJ$dWYU$dYOU$dTKN$dOCLCQ$dOCLCO$dAU@$dLEAUB$dOCLCQ$dOCLCO$dOCLCQ$dWURST$dOCLCA$dLUN$dAJS
019 $a829760740$a964912105$a1026429629$a1058641623$a1066680410
020 $a9783642372100$q(electronic bk.)
020 $a3642372104$q(electronic bk.)
020 $a3642372090$q(print)
020 $a9783642372094$q(print)
020 $z9783642372094
024 7 $a10.1007/978-3-642-37210-0$2doi
035 $a(OCoLC)830377051$z(OCoLC)829760740$z(OCoLC)964912105$z(OCoLC)1026429629$z(OCoLC)1058641623$z(OCoLC)1066680410
050 4 $aHM851$b.I58 2013
060 4 $aHM 851
072 7 $aUBJ$2bicssc
072 7 $aCOM079000$2bisacsh
082 04 $a302.30285$223
084 $a05.20$2bcl
084 $a05.20.$2bcl
111 2 $aInternational Conference on Social Computing, Behavioral Modeling and Prediction$n(6th :$d2013 :$cWashington, D.C.)
245 10 $aSocial computing, behavioral-cultural modeling and prediction :$b6th International Conference, SBP 2013, Washington, DC, USA, April 2-5, 2013. Proceedings /$cAriel M. Greenberg, William G. Kennedy, Nathan D. Bos (eds.).
246 3 $aSBP 2013
264 1 $aBerlin ;$aNew York :$bSpringer,$c©2013.
300 $a1 online resource
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $atext file$bPDF$2rda
490 1 $aLecture notes in computer science,$x0302-9743 ;$v7812
490 1 $aLNCS sublibrary. SL 3, Information systems and application, incl. Internet/Web and HCI
505 00 $tBehavioral Science --$tThe Evolution of Paternal Care /$rMauricio Salgado --$tParent Training Resource Allocation Optimization Using an Agent-Based Model of Child Maltreatment /$rNicholas Keller, Xiaolin Hu --$tInfluence and Power in Group Interactions /$rTomek Strzalkowski [and others] --$tThe Marketcast Method for Aggregating Prediction Market Forecasts /$rPavel Atanasov [and others] --$tPeer Nominations and Its Relation to Interactions in a Computer Game /$rJuan F. Mancilla-Caceres, Eyal Amir, Dorothy Espelage --$tPredicting Personality Using Novel Mobile Phone-Based Metrics /$rYves-Alexandre de Montjoye [and others] --$tMoral Values from Simple Game Play /$rEunkyung Kim [and others] --$tAn Agent-Based Model for Simultaneous Phone and SMS Traffic over Time /$rKenneth Joseph, Wei Wei, Kathleen M. Carley --$tReconstructing Online Behaviors by Effort Minimization /$rArmin Ashouri Rad, Hazhir Rahmandad --$t"Copping" in Heroin Markets: The Hidden Information Costs of Indirect Sales and Why They Matter /$rLee Hoffer, Shah Jamal Alam.
505 80 $tCultural Polarization and the Role of Extremist Agents: A Simple Simulation Model /$rShade T. Shutters --$tUsing Imageability and Topic Chaining to Locate Metaphors in Linguistic Corpora /$rGeorge Aaron Broadwell, Umit Boz, Ignacio Cases, Tomek Strzalkowski, Laurie Feldman --$tAutomated Trading in Prediction Markets /$rAnamaria Berea, Charles Twardy --$tHealth Sciences --$tSocial Network Analysis of Peer Effects on Binge Drinking among U.S. Adolescents /$rMarlon P. Mundt --$tFeedback Dynamic between Emotional Reinforcement and Healthy Eating: An Application of the Reciprocal Markov Model /$rEdward H. Ip [and others] --$tTesting the Foundations of Quantal Response Equilibrium /$rMathew D. McCubbins, Mark Turner, Nicholas Weller --$tModeling the Social Response to a Disease Outbreak /$rJane Evans, Shannon Fast, Natasha Markuzon --$tDiscovering Consumer Health Expressions from Consumer-Contributed Content /$rLing Jiang, Christopher C. Yang, Jiexun Li --$tPatient-Centered Information Extraction for Effective Search on Healthcare Forum /$rYunzhong Liu, Yi Chen.
505 80 $tControlling for Population Variances in Health and Exposure Risk Using Randomized Matrix Based Mathematical Modeling /$rBrian M. Gurbaxani, Troy D. Querec, Elizabeth R. Unger --$tHow Do E-Patients Connect Online? A Study of Social Support Roles in Health Social Networking /$rKatherine Y. Chuang, Christopher C. Yang --$tInformation Science --$tDynamic Stochastic Blockmodels: Statistical Models for Time-Evolving Networks /$rKevin S. Xu, Alfred O. Hero III --$tLA-LDA: A Limited Attention Topic Model for Social Recommendation /$rJeon-Hyung Kang, Kristina Lerman, Lise Getoor --$tGraph Formation Effects on Social Welfare and Inequality in a Networked Resource Game /$rZhuoshu Li, Yu-Han Chang, Rajiv Maheswaran --$tRecommendation in Reciprocal and Bipartite Social Networks-A Case Study of Online Dating /$rMo Yu [and others] --$tIn You We Follow: Determining the Group Leader in Dialogue /$rDavid B. Bracewell, Marc T. Tomlinson --$tPareto Distance for Multi-layer Network Analysis /$rMatteo Magnani, Luca Rossi.
505 80 $tFormation of Multiple Networks /$rMatteo Magnani, Luca Rossi --$tA Flexible Framework for Probabilistic Models of Social Trust /$rBert Huang [and others] --$tCoauthor Prediction for Junior Researchers /$rShuguang Han [and others] --$tMassive Media Event Data Analysis to Assess World-Wide Political Conflict and Instability /$rJianbo Gao, Kalev H. Leetaru, Jing Hu, Claudio Cioffi-Revilla, Philip Schrodt --$tSparsification and Sampling of Networks for Collective Classification /$rTanwistha Saha, Huzefa Rangwala, Carlotta Domeniconi --$tA Comparative Study of Social Media and Traditional Polling in the Egyptian Uprising of 2011 /$rLora Weiss [and others] --$tHashtag Lifespan and Social Networks during the London Riots /$rKimberly Glasgow, Clayton Fink --$tA Text Cube Approach to Human, Social and Cultural Behavior in the Twitter Stream /$rXiong Liu [and others] --$tMapping Cyber-Collective Action among Female Muslim Bloggers for the Women to Drive Movement /$rSerpil Yuce, Nitin Agarwal, Rolf T. Wigand.
505 80 $tDiscovering Patterns in Social Networks with Graph Matching Algorithms /$rKirk Ogaard [and others] --$tCritiquing Text Analysis in Social Modeling: Best Practices, Limitations, and New Frontiers /$rPeter A. Chew --$tWhich Targets to Contact First to Maximize Influence over Social Network /$rKazumi Saito [and others] --$tIntruder or Welcome Friend: Inferring Group Membership in Online Social Networks /$rOfrit Lesser [and others] --$tIdentifying Influential Twitter Users in the 2011 Egyptian Revolution /$rLucas A. Overbey, Christopher Paribello, Terresa Jackson --$tAnalytical Methods to Investigate the Effects of External Influence on Socio-Cultural Opinion Evolution /$rSubhadeep Chakraborty --$tWho Shall We Follow in Twitter for Cyber Vulnerability? /$rBiru Cui [and others] --$tRespondent-Driven Sampling in Online Social Networks /$rChristopher M. Homan, Vincent Silenzio, Randall Sell --$tTrade-Offs in Social and Behavioral Modeling in Mobile Networks /$rYaniv Altshuler [and others] --$tPrivacy Protection in Personalized Web Search: A Peer Group-Based Approach /$rBin Zhou, Jian Xu.
505 80 $tDetecting Anomalous Behaviors Using Structural Properties of Social Networks /$rYaniv Altshuler [and others] --$tMeasuring User Credibility in Social Media /$rMohammad-Ali Abbasi, Huan Liu --$tFinancial Crisis, Omori's Law, and Negative Entropy Flow /$rJianbo Gao, Jing Hu --$tTrust Metrics and Results for Social Media Analysis /$rEli Stickgold, Corey Lofdahl, Michael Farry --$tMethodology --$tPredicting Mobile Call Behavior via Subspace Methods /$rPeng Dai, Wanqing Yang, Shen-Shyang Ho --$tModeling the Interaction between Emergency Communications and Behavior in the Aftermath of a Disaster /$rShridhar Chandan [and others] --$tModeling the Dynamics of Dengue Fever /$rKun Hu [and others] --$tImproving Markov Chain Monte Carlo Estimation with Agent-Based Models /$rRahmatollah Beheshti, Gita Sukthankar --$tMilitary Science --$tGeographic Profiling of Criminal Groups for Military Cordon and Search /$rSamuel H. Huddleston, Matthew S. Gerber, Donald E. Brown --$tExploiting User Model Diversity in Forecast Aggregation /$rH. Van Dyke Parunak, Sven A. Brueckner, Elizabeth Downs --$tRisk-Based Models of Attacker Behavior in Cybersecurity /$rSi Li, Ryan Rickert, Amy Sliva.
500 $aInternational conference proceedings.
500 $aIncludes author index.
520 $aThis book constitutes the proceedings of the 6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013, held in Washington, DC, USA in April 2013. The total of 57 contributions, which consists of papers and posters, included in this volume was carefully reviewed and selected from 137 submissions. This conference is strongly committed to multidisciplinarity, consistent with recent trends in computational social science and related fields. The topics covered are: behavioral science, health sciences, military science and information science. There are also many papers that provide methodological innovation as well as new domain-specific findings.
504 $aWith bibliographical references and index.
546 $aEnglish.
650 0 $aOnline social networks$xPsychological aspects$vCongresses.
650 0 $aComputer science$xSocial aspects$vCongresses.
650 0 $aInterpersonal relations$vCongresses.
650 2 $aInterpersonal Relations.
650 2 $aOnline Systems.
650 2 $aSocial Media.
650 7 $aInterpersonal relations.$2fast$0(OCoLC)fst00977397
653 4 $aComputer science.
653 4 $aComputer Communication Networks.
653 4 $aData mining.
653 4 $aSocial sciences -- Data processing.
653 4 $aInformation Systems.
653 4 $aComputers and Society.
653 4 $aComputer Appl. in Social and Behavioral Sciences.
653 4 $aManagement of Computing and Information Systems.
653 00 $acomputerwetenschappen
653 00 $acomputer sciences
653 00 $ainformatiesystemen
653 00 $ainternet
653 00 $acomputertechnieken
653 00 $acomputer techniques
653 00 $asociale wetenschappen
653 00 $asocial sciences
653 00 $acomputers
653 00 $asamenleving
653 00 $asociety
653 00 $adatamining
653 00 $acomputernetwerken
653 00 $acomputer networks
653 10 $aInformation and Communication Technology (General)
653 10 $aInformatie- en communicatietechnologie (algemeen)
655 0 $aElectronic books.
655 2 $aCongress.
655 4 $aElectronic books.
655 7 $aConference papers and proceedings.$2fast$0(OCoLC)fst01423772
655 7 $aConference papers and proceedings.$2lcgft
700 1 $aGreenberg, Ariel M.
700 1 $aKennedy, William G.$c(Social scientist)
700 1 $aBos, Nathan.
776 08 $iPrinted edition:$z9783642372094
830 0 $aLecture notes in computer science ;$v7812.
830 0 $aLNCS sublibrary.$nSL 3,$pInformation systems and applications, incl. Internet/Web, and HCI.
856 40 $3ProQuest Ebook Central$uhttps://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=3093236
856 40 $3Scholars Portal$uhttp://books.scholarsportal.info/viewdoc.html?id=/ebooks/ebooks3/springer/2013-08-13/3/9783642372100
856 40 $3Scholars Portal Books$uhttp://www.library.yorku.ca/e/resolver/id/2500777
856 40 $3SpringerLink$uhttps://doi.org/10.1007/978-3-642-37210-0
856 40 $3SpringerLink$uhttps://link.springer.com/book/10.1007/978-3-642-37210-0
856 40 $3SpringerLink$uhttps://link.springer.com/book/10.1007/978-3-642-37209-4
856 40 $3SpringerLink$uhttp://www.library.yorku.ca/e/resolver/id/2500778
856 40 $uhttp://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000880069&T=marc&tab=BOOKS
938 $aProQuest Ebook Central$bEBLB$nEBL3093236
938 $aYBP Library Services$bYANK$n10436262
029 1 $aAU@$b000050767558
029 1 $aAU@$b000052938384
029 1 $aAU@$b000065095344
029 1 $aNLGGC$b355506947
029 1 $aNZ1$b14872089
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 367 OTHER HOLDINGS